Cyber Security Hall of Fame - Respect the Past, Protect the
				Future
+ -

The Foundational Era is defined as the act of founding or establishing an industry built upon several individuals early vision and leadership. This era, along with the mission “Respect the Past and Protect the Future”, highlighted significant milestones early in the Cyber Security industry’s 30-year history. No industry has grown as fast as the Cyber Security industry. It’s clear that the Foundational Era has now transitioned to a new – Transformational era and a new era has begun.

The Transformational Era of cybersecurity began as cyber innovation became a significant catalyst of growth for the digital economy. The Transformational Era was fueled by history defining breaches and the move to the cloud. Billions in venture capital powered entrepreneurs to dream big and execute innovation for governments and enterprises. The Transformational Era saw the emergence of the CISO and their evolution to risk officers, bringing cybersecurity directly to the boardrooms of the Fortune 500. The Transformational Era gave birth to new lexicons like Zero Trust, Dev Sec Ops and XDR. Information sharing between governments, industry, and the Five Eyes to coordinate efforts against the adversary.

Cybersecurity has been built on the foundational efforts of its early Hall of Fame founders, and the transformational leaders will power the next generation of Hall of Fame inductees who are making a direct and scalable impact to humanity.

Howard Schmidt
Howard Schmidt 2019 Inductee for the
            Cyber Security Hall of Fame
Partner of Ridge Schmidt Cyber LLC, Cyber-Security Coordinator for Obama Administration
Howard Schmidt had a long career in a variety of fields including government, business, law enforcement, and of course, cybersecurity. Two of his largest contributions to cybersecurity include partnering with Tom Ridge to create a cybersecurity consulting company aptly titled Ridge Schmidt Cyber LLC and serving as the Cyber-Security Coordinator for the Obama Administration.

Schmidt attended the University of Phoenix where he obtained his BS in business administration and his Masters in Organizational Management. After graduating, he served three terms in the United States Air Force. After leaving active duty, he worked in civil services. In the 80’s, he transitioned to a city police officer. After serving as an officer, he climbed the ladder to serve in SWAT, and eventually took a role within the FBI’s National Drug Intelligence Center.

His career in cybersecurity began when he moved to the Air Force Office of Special Investigations. There, he established the first computer forensics lab in government. After 30 years of public service, George W. Bush appointed Schmidt as the Vice Chair of the President's Critical Infrastructure Protection Board and as the special adviser for cyberspace security for the White House.

This was directly following 9/11. While in that position, he was a leader in developing the U.S. National Strategy to Secure CyberSpace. Schmidt also served under President Obama as the White House Cybersecurity Coordinator and held many cyber leadership roles for Ebay. Howard passed away in 2017 due to brain cancer.
Sheila Brand
Sheila  Brand 2019 Inductee for the
            Cyber Security Hall of Fame
Technical chief at HHS, Chief of the Standards Division at NCSC
Sheila Brand is a cybersecurity pioneer known for her work in the private sector and in government computer security. She graduated from the Indiana University, Bloomington with a BA in mathematics.

Brand was the defining person behind the production of the Trusted Computer System Evaluation Criteria, known as the “Orange Book”, a standard set of requirements for assessing and effecting cybersecurity controls that are standard in a computer system. Following that she contributed to related standards, known as the “Rainbow Series” which together formed the basis for the internationally accepted Common Criteria which followed in 1998 and remain in use today.

Sheila worked to integrate theory, policy, and practice in the name of making computers stable and safe for the average consumer. Brand started her career as a young mathematician at Martin Marietta. She was the first woman allowed to travel for the company, and underwent intentional efforts to sabotage her programs by other male employees.

Her skill at seeing these attacks opened a road for her to accept a leadership position as technical chief at HHS. She eventually worked her way up to the role of chief of the standards division at NSA’s National Computer Security Center (NCSC).
Kenneth Minihan
Kenneth Minihan 2019 Inductee for the
            Cyber Security Hall of Fame
Former Air Force Officer, Director of the NSA and DIA
Kenneth Minihan is a former United States Air Force officer known for his service as the Director of the NSA, and prior to that, the Director of the Defense Intelligence Agency under the Clinton administration.

Minihan was born in Pampa, Texas. He attended Florida State University where he obtained his BA in Political Science. He additionally got a Master’s degree from the Naval Postgraduate School. During his time under the NSA, he was the essential person in defining and implementing the National Information Assurance Program, a program that provided adequate IT cybersecurity evaluation and validation services both within government and industry.

In that regard, he operationalized NSA’s Information Systems Security mission promoting engagement with industry and academia and U.S. allies.

Kenneth was an intelligence officer who worked in leadership positions as commander at assignments in the U.S., Europe and Viet Nam. After retiring from the NSA, Minihan served as president of the Security Affairs Support Association. He currently works as a Managing Director in the Paladin Capital Group, developing and implementing new investment opportunities for their Homeland Security Fund and in support of cybersecurity startups.

Minihan has received multiple awards for his service in the military, including the National Security Medal, the Defense Distinguished Service Medal, The Bronze Star, and the National Intelligence Distinguished Service Medal.
Virgil Gligor
Virgil Gligor 2019 Inductee for the
            Cyber Security Hall of Fame
Professor of Electrical and Computer Engineering, Carnegie Mellon University
Virgil D. Gligor is a Romanian Born professor in the Department of Electrical and Computer Engineering at Carnegie Mellon University.

He specializes in researching applied cryptography, distributed Systems, and cybersecurity. Other subjects that he worked on include covert channel analysis, access control mechanisms, intrusion detection, and DoS Protection. Gligor received all his degrees, BS, MS, and PHD, at The University of California Berkeley.

Virgil taught at the University of Maryland from 1976 to 2007. In 2008, he left UM to teach at Carnegie Mellon University. During his time there, he became co-Director of CMU’s CyLab. Gligor has received many accolades and honors for his work in cryptography and security. In 2011, the Association for Computing Machinery awarded him with the Outstanding Innovation Award. Virgil also received the 2006 National Information Systems Security Award from the United States National Security Agency. Additionally, he has been recognized by the IEEE Computer Society for his cryptography work.

Gligor is a pioneer of computer security and has dedicated four decades of his life to exploring cryptography and addressing issues within the cyber world, such as next generation security and trustworthy computing in the face of malware.
Becky Base
Becky Base 2019 Inductee for the
            Cyber Security Hall of Fame
American Cybersecurity Expert, Intrusion Detection System Creator, NSA Employee
Rebecca “Becky” Bace was an American cybersecurity expert and a true pioneer in the field of intrusion detection. She was born in Leeds, Alabama, a rural area. As a child, she was diagnosed with epilepsy. During her high school years, she obtained scholarships from Betty Crocker and Jimmy Hoffa, allowing her to be accepted into the University of Alabama in 1973. During her time there she was the only woman majoring in the field of Engineering.

Bace flourish in her role as a cybersecurity solutions focused engineer despite her having to overcome racism and sexism in the field. Her legacy has solidified her as one of the most influential women in cybersecurity and was one of pioneers of intrusion detection in cybersecurity’s early stages.

In her 16-year career with the NSA, she created the Computer Misuse and Anomaly Detection (CMAD) research program. She is notable for playing an important role in the apprehension of hacker Kevin Mitnick. She spent the latter part of her career helping guide startups as a venture capitalist and maintaining her role as CEO of the Network security consultancy Infidel.

She was known by her peers as the “den mother of computer security” and was a large influence on the Silicon Valley investment boom regarding cybersecurity services and products. Other accomplishments include authoring a book titled Intrusion Detection and providing seed money that enabled UC Davis and Purdue University to kick start computer security labs.
Brian Snow
Brian Snow 2019 Inductee for the
            Cyber Security Hall of Fame
NSA Employee, Mathematics Professor, Technical Director of the Information Assurance Directorate
Brian Snow had an astounding 35 years of employment at the NSA, serving as Technical Director of the Information Assurance Directorate for 6 of those years. He was known for spotting vulnerabilities in security architecture and worked to create solutions that strengthened security.

Recognizing the need to modernize the Agency’s cryptographic program, Brian led the NSA review of AES. This allowed NSA to build on standards-based solutions and gave confidence to NSA collaborators around open, transparent processes for cryptographic capabilities.

After graduating from the University of Colorado, Boulder, Snow started his career as a math professor at Ohio University. There he laid the groundwork for Ohio University’s first computer science program. He started his work with NSA in 1971 working with cryptography and system security. He helped create the Secure Systems Design division and had a large role in the development of military tactical radios. During his career, he strongly supported the transition from RSA to Elliptic Curve Cryptography as the main public key in cryptography.

Snow is retired from the NSA, but before retiring in 2006, he assumed a leadership role in the development of an ethics code for intelligence officers. Snow was a leader in bridging the gap between the government’s cryptographic dominance and the emerging external/commercial cryptographic community. In so doing, he created transparency, trust, and confidence.
Corey Schou
Corey Schou 2019 Inductee for the
            Cyber Security Hall of Fame
University Professor, Associate Dean, Director of NIATEC and SDSC
Corey Schou is a University Professor, Associate Dean, published author, and the director of the National Information Assurance Training and Education Center. He spent ten years serving as the chair of the Colloquium for Information Systems Security Education, a forum he also helped start. During his time serving as chair, Schou worked to help create an open dialogue between leaders in government, workers in the security industry, and top academic minds to advocate the need for and utilization of information security and information assurance education.

Schou attended Rollins College where he obtained is BS in Bio-Chemistry. He eventually attained his PHD in International Law at Florida State University. Schou’s bread and butter is management information and training systems. During his career, he has worked with a large variety of organizations including General Motors, Microsoft, and Federal Express, helping these companies develop their information security.

He also collaborated with others to establish a body of knowledge for computer security. The city of San Francisco later recognized his work with their organizations. In addition he has received various awards including the 1997 TechLearn Award and the 2001 (ISC)2 Tipton Award. He has written on these subjects frequently, with more than 300 books, papers, and articles under his belt. Some of his most well-known books include Information Assurance Handbook: Effective Computer Security and Risk Management Strategies and Principles of Computer Security CompTIA Security+ and Beyond Lab Manual.

Most importantly, he led the development of the college curricula which underpins the Centers of Academic Excellence in Information Systems Security (Cybersecurity) programs at more than 250 colleges and universities in the U.S.
Horst Fiestel
Horst Fiestel 2016 Inductee for the
            Cyber Security Hall of Fame
Cryptographer, inventor of the United States Data Encryption Standard (DES)
Horst Feistel is one of the most important figures of modern cryptography. The ubiquitous DES cipher was primarily his invention, and the techniques he developed are still used in most modern block ciphers. Feistel was born in Berlin, Germany in 1915, and immigrated to the United States in 1934. Here, he earned a Bachelor's degree from MIT, and a Master's from Harvard, both in Physics. Despite this, his true calling was cryptography. Unfortunately, his German background aroused suspicion.

He worked on crypto systems for the U.S. Air Force and MITRE Corp, both of whom were pressured to halt his research. Eventually, he was able to find a research position at IBM's Thomas J. Watson Laboratory.

It was at IBM where Feistel developed the Lucifer cipher, in the early 1970s. The Lucifer algorithm he developed takes 64 bits of text and 64 bits of key material and produces 64 bits of cipher text. The cipher text and the key can be used to recover plaintext, making it a symmetric cipher. The specific method he used to scramble the data became known as a Feistel Network. Lucifer was widely considered to be one of the most secure crypto systems of its time. After a few tweaks mandated by the NSA, such as scaling back the key size to 56 bits, Lucifer was chosen as Data Encryption Standard (DES) for the United States. Feistel died in 1990.
Lance J. Hoffman
Lance J. Hoffman 2016 Inductee for the
            Cyber Security Hall of Fame
Distinguished Research Professor of Computer Science The George Washington University
Professor Hoffman developed the nation’s first regularly offered university course on computer security and is the author or editor of five books that captured the state of cybersecurity and privacy at various times between 1973 and 1995. His 1999 study of encryption products explored the effect of the United States export control regime that he later presented before Congress.

His research has spanned multiple aspects of cybersecurity including cryptography policy, risk analysis, and statistical inference for data mining. His thought leadership included pioneering workshops on Internet voting, cybersecurity educational competitions, and workforce development; the institutionalizing of the ACM Conference on Computers, Freedom, and Privacy; and the development of courses that focused on e-commerce security, information policy, and cybersecurity and governance as the field broadened.

He initiated and still leads a CyberCorps scholarship program that has produced dozens of cybersecurity experts with degrees in at least ten majors who have gone on to work for dozens of different government agencies. Some later started their own cybersecurity companies.
Paul A. Karger
Paul Karger 2016 Inductee for the
            Cyber Security Hall of Fame
High Assurance Architect, Prolific Writer, Creative Inventor
Upon graduation from MIT, Paul A. Karger was commissioned in the U.S. Air Force. His Multics security work included a classic 1974 paper on penetration testing. He taught at the U.S. Air Force Academy before joining Digital Equipment Corporation, where he worked on multilevel secure systems.

He was able to transform requirements and formalisms into designs and implementations. Paul was the lead designer of the VAX VMM security kernel, which was successfully evaluated at TCSEC Class A1. This was a remarkable accomplishment: a product from a major corporation able to enforce mandatory access control policies with high assurance. Paul earned a Ph.D. from the University of Cambridge. He was security architect for the Open Software Foundation. He worked on telephone security at GTE Laboratories. Finally, on the staff of the Thomas J. Watson Research Center, Paul was a founding member of IBM's ethical hacking consulting service. He continued to design commercial systems including a high assurance smart card operating system.

Paul was always generous with his time and encyclopedic knowledge of secure systems. His enthusiasm for high assurance development was contagious. Insight, clear thinking, and communication skills allowed him to be a leader in shaping our notions regarding highly trustworthy systems. He never tired of providing examples where security thinking during system design could make a difference. His 1995 paper on privacy threats to intelligent transport systems was a harbinger of dangers ahead if security for GPS and mobile devices was ignored.

Prior to his untimely death, Paul was the inventor or co-inventor on 14 U.S. patents and 19 non-U.S. patents. He wrote or co-authored more than 90 technical papers, greatly influencing the evolution of high assurance technology.
Butler Lampson
Butler Lampson 2016 Inductee for the
            Cyber Security Hall of Fame
Adjunct Professor at MIT, Turing Award and Draper Prize winner.
Butler Lampson is a Technical Fellow at Microsoft Corporation and an Adjunct Professor of Computer Science and Electrical Engineering at MIT. He was on the faculty at Berkeley and then at the Computer Science Laboratory at Xerox PARC and at Digital's Systems Research Center. He has worked on computer architecture, local area networks, raster printers, page description languages, operating systems, remote procedure call, programming languages and their semantics, programming in the large, fault-tolerant computing, transaction processing, computer security, WHSIWYG editors, and tablet computers. He was one of the designers of the SDS 940 time-sharing system, the Alto personal distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet LAN, the SDSI/SPKI system for network security, the Microsoft Tablet PC software, the Microsoft Palladium high-assurance stack, and several programming languages.

He received an AB from Harvard University, a PhD in EECS from the University of California at Berkeley, and honorary ScD's from the Eidgenössische Technische Hochschule, Zurich and the University of Bologna. He holds a number of patents on networks, security, raster printing, and transaction processing. He is a member of the National Academy of Sciences and the National Academy of Engineering and a Fellow of the Association for Computing Machinery and the American Academy of Arts and Sciences. He received the ACM Software Systems Award in 1984 for his work on the Alto, the IEEE Computer Pioneer award in 1996, the National Computer Systems Security Award in 1998, the IEEE von Neumann Medal in 2001, the Turing Award in 1992, and the National Academy of Engineering's Draper Prize in 2004.

At Microsoft he has worked on anti-piracy, security, fault-tolerance, and user interfaces. He was one of the designers of Palladium, and spent two years as an architect in the Tablet PC group. Currently he is in Microsoft Research, working on security, privacy, and fault-tolerance, and kibitzing in systems, networking, and other areas.
Leonard J. LaPadula
Leonard J. LaPadula 2016 Inductee for the
            Cyber Security Hall of Fame
Co-author of the Bell-LaPadula model of computer security
With a major in Mathematics, Len got his start in computers with IBM in the Time Life building in NYC in 1960. He continued in this new field as an Army Lieutenant with the Army Security Agency Training Center and School at Fort Devens, Massachusetts from 1961 to 1963. There he worked with an IBM 650 (1000 words of main memory!) and taught Fortran programming. After over 40 years with The MITRE Corporation where he worked on numerous federal government contracts, Len retired in 2013. 

His principal efforts with MITRE supported various initiatives to improve computer and network security, ending with a project on cyber resiliency. In 1973, he co-authored with David Bell a pioneering paper on computer security, which came to be known as the “Bell-LaPadula Model”. 

This mathematical model became part of the computer science curriculum in many universities, influenced developments in computer systems, and contributed to the “Orange Book” series published by the National Security Agency. As a retiree, he enjoys quiet gardening.
William H. Murray
William H. Murray 2016 Inductee for the
            Cyber Security Hall of Fame
Pioneer, author, a founder of Colloquium for Information System Security Education (CISSE)
William Hugh Murray began his security career at IBM in the late 1960s when he managed the development of the user access control subsystems for IBM’s ground breaking Advanced Administrative System (AAS), a model for later systems. In 1976 he authored the IBM publication Data Security Controls and Procedures which remained in publication into the 90s. These two works began a career providing security leadership, innovation, guidance, and support to government, business, and academia and their requirements to IBM research and product development.

He is a founder of the Colloquium for Information System Security Education (CISSE). He led the ISSA committee that expressed the professional common body of knowledge which was used to develop the examination for certifying information security professionals and the (ISC)2 committee that wrote the professional code of conduct and ethical guidance. He served for more than a decade on the Board of (ISC)2 seeing it from a volunteer effort to a self-supporting enterprise serving more than a hundred thousand professionals.
Dan Geer
Dan Geer 2016 Inductee for the
            Cyber Security Hall of Fame
Chief Information Security Officer at In-Q-Tel
Dan Geer has ten years in clinical and research medical computing followed by five years running MIT’s Project Athena. After a small stint in the Research Division of the then Digital Equipment Corporation, he became involved in a series of start-up endeavors, in all cases either as a founder outright or an officer of the company.

Mr. Geer now finds himself in government service as the CISO at In-Q-Tel, the investment arm of the U.S. Intelligence community. He is a frequent author, six times entrepreneur, and has spoken five times before Congress on cybersecurity initiatives.
Cynthia E Irvine
Cynthia E Irvine 2015 Inductee for the
            Cyber Security Hall of Fame
Distinguished Professor of Computer Science at Naval Postgraduate School
Cynthia E. Irvine is a Distinguished Professor of Computer Science at the Naval Postgraduate School. Her research has focused on developmental security as applied to the creation of trustworthy systems, and more recently, on cyber operations. She is a champion of cyber security instruction designed to ensure that the foundational concepts of constructive cyber security are integrated into academic courses and curricula.

Through curriculum development, educational tools, the supervision of student research, and her professional activities, Dr. Irvine is a true leader in cyber security education.
Jerome H. Saltzer
Jerome Howard Saltzer 2015 Inductee for
                the Cyber Security Hall of Fame
Professor Emeritus of Computer Science Massachusetts Institute of Technology
Jerome H. Saltzer has been a faculty member at MIT since 1966, where his teaching and research interests have been about principles of computer system engineering. His involvement in cyber security began with the discovery in 1964 that it was surprisingly easy to break into the MIT Compatible Time-Sharing System.

He helped design the security aspects of the Multics time-sharing system and he led the development of a security kernel for Multics; later he led the development of the Kerberos single-login authentication system. His paper with Michael D. Schroeder "The Protection of Information in Computer Systems" collected a set of security principles that have been widely cited for four decades.
Ron Ross
Ron Ross 2015 Inductee for the Cyber Security
                Hall of Fame
Fellow, National Institute of Standards and Technology
Ron Ross is considered the “Father” of the Federal Information Security Management Act (FISMA) security standards and recognized as one of the world’s leading experts on cyber security. He is the principal architect of the NIST Risk Management Framework and led the development of the first set of unified cyber security standards for the federal government, including the Department of Defense and the Intelligence Community.

Dr. Ross has received the NSA Scientific Achievement Award, Defense Superior Service Medal, Department of Commerce Gold and Silver Medals, and three Federal 100 Awards. He has been inducted into the Information Systems Security Association (ISSA) Hall of Fame and is an ISSA Distinguished Fellow.
Steven B. Lipner
Steven B. Lipner 2015 Inductee for the
                Cyber Security Hall of Fame
Retd Director of Software Security in Trustworthy Computing Security at Microsoft
Steven B. Lipner is recently retired as the Partner Director of Software Security in Trustworthy Computing Security at Microsoft and serves as a board member and chair of SAFECode. He led Microsoft’s Security Development Lifecycle team and was responsible for its corporate strategies and policies for supply chain security and for strategies related to government security evaluation of Microsoft products.

He is named as an inventor on 12 U.S. patents with two pending applications in the field of computer and network security, and is co-author of the book, The Security Development Lifecycle.
Susan Landau
Susan Landau 2015 Inductee for the Cyber
                Security Hall of Fame
Professor of Cybersecurity Policy in Worcester Polytechnic Institute
Susan Landau has been a twenty-year leader in the "Crypto Wars." Her books, Privacy on the Line: The Politics of Wiretapping and Encryption, co-authored with Whitfield Diffie, and Surveillance or Security? The Risks Posed by New Wiretapping Technologies, testimony in Congress, and technical and policy research have helped ensure the widespread availability of strong encryption.

Landau has been a long-term advocate for NIST's Computer Security Lab, including during her tenure on the Information Security and Privacy Advisory Board. She is a strong advocate for women in computer science, and has organized workshops for women students and young faculty. Landau is Professor of Cybersecurity Policy at Worcester Polytechnic Institute, and has previously been a Senior Staff Privacy Analyst at Google and a Distinguished Engineer at Sun Microsystems.
Paul Kocher
Paul Kocher 2014 Inductee for the Cyber
            Security Hall of Fame
Designed SSL3 cryptographic elements
Paul Kocher designed the cryptographic elements of SSL3 back in the mid-1990s, while still an undergraduate at Stanford, thereby gaining him an international reputation for allowing secure Internet transactions.

The longevity of SSL3 is a testament to his brilliance, as is the fact that he is entirely self-taught in cryptography.
Vinton G. Cerf
Vinton G. Cerf 2014 Inductee for the Cyber
            Security Hall of Fame
VP & Chief Internet Evangelist - Google
Vinton G. Cerf is vice president and Chief Internet Evangelist for Google. He contributes to global policy development and continued spread of the Internet.

Widely known as one of the "Fathers of the Internet," Cerf is the co-designer of the TCP/IP protocols and the architecture of the Internet.
Philip R. Zimmermann
Philip R. Zimmermann 2014 Inductee for the
            Cyber Security Hall of Fame
Creator of Pretty Good Privacy (PGP)
Philip R. Zimmermann is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VOIP encryption protocols, notably ZRTP and Zfone.
Steven M. Bellovin
Steven M. Bellovin 2014 Inductee for the
            Cyber Security Hall of Fame
Professor of Computer Science - Columbia University
Steven M. Bellovin is a professor of computer science at Columbia University, where he does research on networks, security, and especially why the two don't get along, as well as related public policy issues.

Bellovin is the co-author of Firewalls and Internet Security: Repelling the Wily Hacker, and holds a number of patents on cryptographic and network protocols.
Richard Alan Clarke
Richard Alan Clarke 2014 Inductee for the
            Cyber Security Hall of Fame
Served as Special Advisor to the President on cyber security
Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Under President George W. Bush, he served as the Special Advisor to the President on cyber security.

Mr. Clarke developed and found sponsorship for legislation which created the Cyber Corps and lead the development of the first National Plan for Cyber Security.
David E. Bell
David E. Bell 2013 Inductee for the Cyber
                Security Hall of Fame
Co-author of the Bell-LaPadula model of computer security
Dr. Bell was the co-author of the Bell-LaPadula model of computer security (with Leonard J. LaPadula). The model became the most widely used security model in the development of trusted (secure) computer systems.

His two papers “Lattices, Policies and Implementations” and “Putting Policy Commonalities to Work” showed not only that any Boolean policy could be supported by any Boolean-policy implementation, but also that every “different” security policy in the literature was a Boolean security policy, and hence supportable by any Boolean implementation.
Jim Bidzos
Jim Bidzos 2013 Inductee for the Cyber
                Security Hall of Fame
Jim Bidzos is CEO and Chairman of VeriSign, Inc
He served as CEO of RSA Data Security from 1986 through 1999. Along with RSA co-founder and MIT professor Ron Rivest, Bidzos built RSA into the premier cryptography company in the 80s and 90s.

Bidzos formed Verisign in 1995 to provide trusted certificate authority services to a global market after pioneering the concept within RSA beginning in 1986.He also created the RSA Conference in 1991, and was the Chairman of the event until his retirement from that position in 2004.
Eugene H. Spafford
Eugene H. Spafford 2013 Inductee for the
                Cyber Security Hall of Fame
Professor of CS @ Purdue University
Eugene H. Spafford is one of the most recognized leaders in the field of computing. Dr. Eugene Spafford is a professor with an appointment in Computer Science at Purdue University, where he has been a member of the faculty since 1987.

He is a senior advisor and consultant on issues of security and intelligence, education, and policy to a number of major companies, academic and government agencies, including Microsoft, Intel, Unisys, the US Air Force, the NSA, the GAO, the FBI, the NSF, the DoJ, the DoE, and two Presidents of the United States.
James Anderson
James Anderson 2013 Inductee for the Cyber
                Security Hall of Fame
Started the study of intrusion detection and "THE BRAIN TRUST"
The late James Anderson effectively started the field of intrusion detection, invented the concept of the reference monitor, made some very significant but classified contributions to counterintelligence, and organized some of the first cyber penetration teams, including a well-known group at CIA named "The Brain Trust".

Mr. Anderson originated the idea of contaminated media and loading an altered OS, the "2 card loader" issue, whose intellectual successor is such things as Stuxnet, APTs, and arguably was the first computer virus. In 1990, Mr. Anderson was one of the first recipients of the National Computer Systems Security Award.
Willis H. Ware
Willis H. Ware 2013 Inductee for the Cyber
                Security Hall of Fame
Computer Scientist emeritus at RAND Corporation
The late Willis H. Ware (Ph.D., Princeton University, 1951) was a senior computer scientist emeritus with the RAND Corporation. An electrical engineer, he devoted his career to hardware, software, architectures, software development, networks, federal agency and military applications, management of computer-intensive projects, public policy and legislation.

Dr. Ware was a member of the NAE, a Fellow of the IEEE, AAAS,and ACM. He received the U.S. Air Force Exceptional Civilian Service Medal (1979), the IEEE Centennial Medal (1984), the National Computer System Security Award (1989), and the IEEE Computer Pioneer Award (1993).
F. Lynn McNulty
F. Lynn McNulty 2012 Inductee for the Cyber
            Security Hall of Fame
An early champion of Information Security in the Government
F. Lynn McNulty, an early champion of information security in the government, passed away on June 4. McNulty, whom Federal Computer Week identified as one of the key thought leaders of the past 25 years in a feature package that will appear in the June 15 issue, spent 30 years in the government.

Over the span of his federal career he served as the State Department’s first director of information systems security; as security program manager at the Federal Aviation Administration; and as associate director for computer security at the National Institute of Standards and Technology.
Martin Hellman
Martin Hellman 2012 Inductee for the Cyber
            Security Hall of Fame
Professor Emeritus - Stanford University
Professor Hellman is best known for his invention, with Diffie and Merkle, of public key cryptography. In addition to many other uses, this technology forms the basis for secure transactions on the Internet.

He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to Study National Cryptographic Policy, whose main recommendations have since been implemented.
Ralph Merkle
Ralph Merkle 2012 Inductee for the Cyber S
            ecurity Hall of Fame
Developed earliest public key cryptography system with Diffie and Hellman
Merkle developed the world's earliest public key cryptographic system. Their insight underpins secure transactions on the Internet, enabling e-commerce and a host of other interactions in which secure electronic communications are required.

Since 1988, Merkle has been researching nanotechnology and, in 2003, became a distinguished professor at Georgia Tech before returning to California in 2006.He has been awarded the RSA Award in Mathematics (2000) and the IEEE Richard W. Hamming Medal (2010).
Whitfield Diffie
Whitfield Diffie 2012 Inductee for the
            Cyber Security Hall of Fame
Developed the world's earliest public key cryptographic system along with Merkle and Hellman
Diffie and Hellman worked together throughout 1975 and were joined by Ralph Merkle in 1976. The results of their work appeared in Diffie and Hellman's paper, New Directions in Cryptography, in November 1976. The insights in this paper underpin secure transactions on the Internet, enabling e-commerce and a host of other interactions in which secure electronic communications are required.

In 1992, Diffie was awarded an honorary doctorate by the Swiss Federal Institute of Technology in Zurich, and in 2010, shared the IEEE Richard W. Hamming Medal with Ralph Merkle and Martin Hellman.
Dorothy Denning
Dorothy Denning 2012 Inductee for the Cyber
            Security Hall of Fame
Dorothy Denning is recognized as one of the world's leading experts in information security.
She is currently a Distinguished Professor in the Department of Defense Analysis at the Naval Postgraduate Schoolin Monterey, CA, and is one of the faculty associated with the Center on Terrorism and Irregular Warfare and with the Center for Information Systems Security Studies and Research.

Dr. Denning has published 150 articles and four books, her most recent being Information Warfare and Security. She has been named to the ISSA Hall of Fame (2003), awarded the CSO COMPASS award (2003), named as both a CISSP and as a CISM honoris causa, and elected as a Fellow of the ACM (1995).
Roger Schell
Roger Schell 2012 Inductee for the Cyber
            Security Hall of Fame
President of ESec, providing platforms for secure, reliable e-business on the Internet
Dr. Schell was co-founder and Vice President for Engineering of Gemini Computers, Inc., where he directed development of Gemini's Class A1 network processor commercial product. He was also the founding Deputy Director of the (now) National Computer Security Center. Previously he was an Associate Professor of Computer Science at the Naval Postgraduate School.

He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award.
Peter Neumann
Peter Neumann 2012 Inductee for the Cyber
            Security Hall of Fame
SRI Computer Science Lab since September 1971
In the Computer Science Laboratory at SRI he led the Provably Secure Operating System (PSOS) project, under which the SRI Hierarchical Development Methodology (HDM) was created.

Dr. Neumann’s main research interests continue to involve security, crypto applications, overall system survivability, reliability, fault tolerance, safety, software-engineering methodology, systems in the large, applications of formal methods, and risk avoidance. He has written numerous papers, given many talks, and has provided testimony before government hearings. He recently published a book Computer Related Risks (ACM Press, 1995).
Carl Landwehr
Carl Landwehr 2012 Inductee for the Cyber
            Security Hall of Fame
Lead Research Scientist - CSPRI at George Washington University
Dr. Landwehr is a noted expert in trustworthy computing, including high assurance software development, understanding software flaws and vulnerabilities, token-based authentication, system evaluation and certification methods, multilevel security, and architectures for intrusion tolerant systems

He has been a leader in cybersecurity research, having led cybersecurity programs at the National Science Foundation from 2001-2004 and 2009-2011, overseeing the disbursement of more than $110M of grants, and having served as a division chief at IARPA from 2005-2009.
Ronald L.Rivest
Ron Rivest 2012 Inductee for the Cyber Security
            Hall of Fame
Professor of Computer Science at MIT's EECS Department
He is the Andrew and Erna Viterbi Professor of Computer Science at MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL)

Rivest is a member of the National Academy of Engineering, the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptologic Research, and the American Academy of Arts and Sciences
Adi Shamir
Adi Shamir 2012 Inductee for the Cyber Security
            Hall of Fame
Faculty of Mathematics and Computer Science at the Weizmann Institute
. He is a co-inventor of the RSA algorithm (with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification scheme (with Uriel Feige and Amos Fiat), one of the inventors of differential cryptanalysis and has made numerous contributions to the fields of cryptography and computer science

In addition to RSA, Shamir's other numerous inventions and contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the TWIRL and TWINKLE factoring devices.

Shamir has also made contributions to computer science outside of cryptography, such as finding the first linear time algorithm for 2-satisfiability and showing the equivalence of the complexity classes PSPACE and IP.
Leonard Adleman
Leonard Adleman 2012 Inductee for the Cyber
            Security Hall of Fame
Theoretical computer scientist and Prof. of CS and Mol.Biol. at the USC.
He is known for being a co-inventor of the RSA (Rivest-Shamir-Adleman) cryptosystem in 1977, and of DNA computing. RSA is in widespread use in security applications, including https.

For his contribution to the invention of the RSA cryptosystem, Adleman, along with Ron Rivest and Adi Shamir, has been a recipient of the 1996 Paris Kanellakis Theory and Practice Award and the 2002 ACM Turing Award, often called the Nobel Prize of Computer Science. He is one of the original discoverers of the Adleman-Pomerance-Rumely primality test. Fred Cohen, in his 1984 paper, Experiments with Computer Viruses has credited Adleman with coining the term "virus".